Equipment manufactured by Kongsberg Discovery is often connected to a local area network (LAN). When you connect a computer to a local area network you will always expose the data on that computer. All the other computers connected to the same network may be able to access your data. Several threats are imminent:
|
• |
Remote computers can read your data. |
|
• |
Remote computers can change your data. |
|
• |
Remote computers can change the behavior of your computer, for example by installing unwanted software. |
Usually, two parameters are used to define the threat level:
|
1 |
The likelihood that any remote computer will do any of the above. |
|
2 |
The damage inflicted if a remote computer succeeds doing any of the above. |
Kongsberg Discovery has no information about your complete system installation. Products provided by Kongsberg Discovery are always regarded as stand-alone offline systems. They are regarded as stand-alone even though they may be connected to a local area network for sensor interfaces or data distribution.
Note
No network safety applications are installed on Kongsberg Discovery computers. The computer is not protected against viruses, malware or unauthorized access by external users.
Securing the TV80 system has no meaning unless you have established a policy that secures all the computers on the network. This policy must include physical access by trained and trusted users. The customer or end user of the TV80 system is responsible for defining and implementing a security policy and providing the relevant network security applications.
NoteKongsberg Discovery will not accept any responsibility for errors and/or damages caused by unauthorized use of or access to the TV80 system.